Follow Dark Reading:
 October 12, 2019
LATEST SECURITY NEWS & COMMENTARY
A Murderers' Row of Poisoning Attacks
Poisoning can be used against network infrastructure and applications. Understanding how DNS cache poisoning, machine learning model poisoning and other attacks work can help you prepare the proper antidote.
Works of Art: Cybersecurity Inspires 6 Winning Ideas
The Center for Long Term Cybersecurity recently awarded grants to six artists in a contest to come up with ideas for works with security themes and elements. Check 'em out.
Can the Girl Scouts Save the Moon from Cyberattack?
The Girl Scouts Cyber Challenge event, later this month, pledges to give middle and high-school girls a realistic, and fun, look at cybersecurity careers.
6 Active Directory Security Tips for Your Poor, Neglected AD
The unappreciated core of your enterprise IT network needs your security team's TLC. Here are a few ways to give Active Directory the security love it needs.

Cartoon Contest: Second Wind

Feeling creative? Submit your caption in the comments, and our panel of experts will reward the winner with a $25 Amazon gift card.


Creative Wi-Fi Passwords
Let's see a hacker figure out one of these.
FROM THE NEWS DESK

FBI: Phishing Can Defeat Two-Factor Authentication
A recent Privacy Industry Notification points to two new hacker tools that can turn a victim's browser into a credential-stealing zombie.
Close the Gap Between Cyber-Risk and Business Risk
Four steps outlining how security teams can better understand their company's cyber-risk and demonstrate to company leadership what's being done to mitigate the resulting business risk.
MORE NEWS & COMMENTARY
HOT TOPICS
Rethinking Cybersecurity Hiring: Dumping Resumes & Other 'Garbage'
In a market that favors the job seeker, what are some alternatives to resume-sifting that will identify the talent you need?

8 Ways Businesses Unknowingly Help Hackers
From lengthy email signatures to employees' social media posts, we look at the many ways organizations make it easier for attackers to break in.

Security Tool Sprawl Reaches Tipping Point
How a new open source initiative for interoperable security tools and a wave of consolidation could finally provide some relief for overwhelmed security analysts and SOCs.

MORE
EDITORS' CHOICE

7 Considerations Before Adopting Security Standards
Here's what to think through as you prepare your organization for standards compliance.
Build Your Cybersecurity Toolkit at Black Hat Europe in December
Now's the time to start planning what to see and do at Black Hat Europe, which is jam-packed with relevant Briefings and Arsenal demos.
Tech Resources
ACCESS TECH LIBRARY NOW

  • Forecast Calls for 'EPYC' Innovation and Discovery

    In this webinar, we'll discuss how new technology can help you harness AI, machine and deep learning with high performance computing (HPC). HPC is helping make the impossible possible such as transforming the treatment of diseases, cutting storm predictions in ...

  • How is the Latest UPS Technology Designed for Edge & Cloud Computing?

    Edge Computing and Cloud are two key pillars of new internet architectures. Thus, you must rethink the infrastructure solutions you deploy to support these environments, specifically Uninterruptible Power Supply (UPS) technologies.

MORE WEBINARS
FEATURED REPORTS
MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Daily
-- Published By Dark Reading
Informa Tech
303 Second St., Suite 900 South Tower, San Francisco, CA 94107
To update your profile, change your e-mail address, or unsubscribe, click here.
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.